Abstract
In a pervasive computing environment, principle authentication veries if a person is the one he claims to be. However, being sure that you are talking to the expected entity does not mean this entity is trusted to do what you expect
him to do, and only that. This paper discusses trust, trustworthiness, authentication and trustworthy authentication in ubiquitous and pervasive computing. The approaches for implementing trustworthy authentication and related work are also presented.
him to do, and only that. This paper discusses trust, trustworthiness, authentication and trustworthy authentication in ubiquitous and pervasive computing. The approaches for implementing trustworthy authentication and related work are also presented.
Original language | English |
---|---|
Title of host publication | Procs 10th ACM Symposium on Mobility Management and Wireless Access |
Publisher | ACM Press |
Pages | 135-138 |
Number of pages | 4 |
ISBN (Print) | 978-1-4503-1623-1 |
Publication status | Published - Oct 2012 |
Keywords
- ubiquitous computing
- authentication
- trust
- trustworthiness
- , trustworthy authentication